It is impossible to find a system administrator for whom the problem of event log analysis has never been acute. To keep your network safe and sound you have to constantly trace valid and invalid logon attempts, events related to resource use, such as creating, opening, or deleting of files, etc. This process of monitoring event logs has always devoured a lot of time.